unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Essential User Access Review Checklist [Excel Template]
Do you have employees with access to sensitive systems they no longer need? Are there team members...
2024-3-10 18:58:9 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
uar
reviews
checklist
cybeready
NIST Releases Cybersecurity Framework 2.0: What’s Next?
Many global cyber teams are analyzing cyber defense gaps now that the NIST Cybersecuri...
2024-3-10 17:22:14 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
csf
lohrmann
security
governance
USENIX Security ’23 – “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security
Authors/Presenters: Jonas Hielscher. Uta Menges, Simon Parkin, Annette Kluge, M. Angela...
2024-3-10 00:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
simon
nocookie
Salt Security, API Posture Governance, and the NIST Cybersecurity Framework 2.0
Securing organizations against today’s most advanced threats continues to be challengin...
2024-3-9 09:47:7 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
salt
governance
csf
BianLian GOs for PowerShell After TeamCity Exploitation
March 8, 2024Contributors: Justin Timothy, Threat Intelligence Consultant, Gabe Renfro, DFIR Advis...
2024-3-9 07:29:46 | 阅读: 26 |
收藏
|
Security Boulevard - securityboulevard.com
powershell
bianlian
malicious
teamcity
CrowdStrike Extends Scope and Reach of Cybersecurity Portfolio
CrowdStrike this week acquired Flow Security to add data security posture management (D...
2024-3-9 06:22:54 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
security
falcon
leaders
What’s the cause of the problem part two
This is the fourth post in a series of posts inspired by reading Sheryl Sandberg’s book...
2024-3-9 05:4:0 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
sandberg
workforce
earnings
percent
lean
IONIX ASM Platform Adds Testing Tools to Simulate Cyberattacks
IONIX this week extended its attack surface management (ASM) platform to include an ability to use...
2024-3-9 04:51:1 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
gaffan
ionix
exploited
Replicating Realistic Threat Behavior is Critical to Red Teaming, But It Doesn’t Have to Be Complicated
Organizational red teams are tasked with the critical responsibility of ensuring pre...
2024-3-9 04:30:48 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
safebreach
security
teaming
branching
realistic
Russian Hackers Access Source Code in Ongoing Attack on Microsoft
The Russian state-sponsored bad actors who hacked into the corporate email accounts of executives a...
2024-3-9 04:20:24 | 阅读: 31 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
blizzard
midnight
security
friday
USENIX Security ’23 – Work-From-Home And COVID-19: Trajectories Of Endpoint Security Management In A Security Operations Center
Authors/Presenters: Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru...
2024-3-9 04:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
alexandru
hahn
Exploit Targets Critical Vulnerability in JetBrains’ TeamCity, Company Advises Immediate Update
A critical vulnerability, identified as CVE-2024-27198, has been discovered in JetBrain...
2024-3-9 02:46:34 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
teamcity
jetbrains
security
nuspire
immediate
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #281 – The Needed Changes
via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lau...
2024-3-9 02:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
agile
comic
mikkel
luxshan
handelman
Response to ScreenConnect’s Recent Zero-day Vulnerability Exploitation
On February 19, 2024, ConnectWise published a security advisory detailing the discovery of two sign...
2024-3-9 01:37:9 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
rundll32
ransomware
Change Healthcare Gets Pharmacy Systems Up After Ransomware Attack
There is some relief coming for beleaguered pharmacies, hospitals, and patient now that UnitedHealt...
2024-3-9 01:15:26 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
hospitals
blackcat
healthcare
funding
Understanding the White House Report on Secure and Measurable Software
Get details on the new White House ONCD report, how to address it, and how Legit can help.The Whit...
2024-3-9 00:58:13 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
memory
development
legit
TikTok Ban Incoming — but ByteDance Fights Back
ByteDance mobilizing addicted user base, as U.S. TikTok ban steamrolls through Capitol...
2024-3-9 00:10:44 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
richi
ban
committee
security
bytedance
Meet the Female Engineers Behind Kasada’s Mobile Bot Defense
In honor of International Women’s Day, we’re highlighting some kick-ass women at Kasada who are at...
2024-3-9 00:8:39 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
liz
mira
kasada
software
USENIX Security ’23 – Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
*Distinguished Paper Award Winner*Authors/Presenters:*Omer Akgul, Taha Eghtesad, Amit...
2024-3-9 00:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
daniel
grossklags
Out of the kernel, into the tokens
By Max Ammann and Emilio LópezOur application security team leaves no stone unturned; our audits d...
2024-3-8 22:0:48 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
kaslr
jose
bypass
syslog
security
Previous
233
234
235
236
237
238
239
240
Next